The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them. |
|
 |
|
|
Synthesis of the vulnerability 
An attacker can use several vulnerabilities of JDOM.
Vulnerable products: JDOM.
Severity of this weakness: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 18/02/2015.
Références of this bulletin: VIGILANCE-VUL-16212.
Description of the vulnerability 
Several vulnerabilities were announced in JDOM.
An unknown vulnerability was announced in the generation of output strings of the test suite. This vulnerability is not confirmed. [severity:1/4]
An unknown vulnerability was announced in the root file path processing of JDOMBean.java. [severity:2/4] Full bulletin, software filtering, emails, fixes, ... (Request your free trial)
This cybersecurity vulnerability impacts software or systems such as JDOM.
Our Vigil@nce team determined that the severity of this vulnerability is medium.
The trust level is of type confirmed by the editor, with an origin of document.
This bulletin is about 2 vulnerabilities.
An attacker with a expert ability can exploit this weakness alert.
Solutions for this threat 
JDOM: version 2.0.6.
The version 2.0.6 is fixed:
http://www.jdom.org/
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)
Computer vulnerabilities tracking service 
Vigil@nce provides a software vulnerability alert. The Vigil@nce vulnerability database contains several thousand vulnerabilities.
|